Vertical Industries  >   Leisure Industry  >  

Resorts

RSS Feed    Add to Google    Add to My Yahoo!
Resorts White Papers (View All Report Types)
 
Infrastructure Management Is Not Enough: The New IT Operations Imperative
sponsored by Mercury
WHITE PAPER: Infrastructure management is not enough to ensure enterprise applications are meeting business goals because users experience applications, NOT infrastructure.
Posted: 20 Dec 2005 | Published: 01 Dec 2005

Mercury

Travel Industry: How to Drive Customer Acquisition and Retention with Personalized, Seamless Experiences
sponsored by Gigya
WHITE PAPER: Legacy technologies built for employee identities aren't effective at transforming customer data into actionable insight. Discover how a purpose-built customer identity and access management platform can help travel companies capture, manage, and leverage customer data across digital channels to drive greater customer engagement and loyalty.
Posted: 21 Apr 2016 | Published: 31 Dec 2015

Gigya

Managing and Securing Mobile Healthcare Data and Devices
sponsored by Fiberlink Communications
WHITE PAPER: Regulatory compliance tops the list of concerns among healthcare and life sciences IT professionals with 86% of healthcare IT decision-makers rating it as a high or critical priority over the course of the coming year. Check out this paper to find out more!
Posted: 17 Mar 2010 | Published: 17 Mar 2010

Fiberlink Communications

Rising Above the Competition as a Cloud Services Provider: Five Effective Steps for Claiming Your Share of the Pie
sponsored by CA Technologies.
WHITE PAPER: Learn how you can rise above the competition as a cloud provider, especially by using the five key steps outlined in this resource.
Posted: 06 Apr 2012 | Published: 06 Apr 2012

CA Technologies.

Small Form Factor (SFF) SAS - Meeting the Demanding Requirements in Specific Markets
sponsored by Xtore
WHITE PAPER: SAS technology has been proven to be the most versatile storage solution in data transfer and high performance. Read this white paper to learn about a solution that renders the necessary performance needed for your client's expanding market requirements.
Posted: 22 Aug 2007 | Published: 01 Aug 2007

Xtore

Measuring the Business Impacts of Effective Data: Chapter One of a Three-Part Study
sponsored by Sybase, an SAP company
WHITE PAPER: This study of over 150 Fortune 1000 firms from every major industry or vertical explores issues associated with the lifeblood of today’s enterprises: data. The findings demonstrate the often dramatic impacts that even marginal investments in information technology can have when that technology addresses data quality, usability, and intelligence.
Posted: 02 Nov 2010 | Published: 02 Nov 2010

Sybase, an SAP company

Planning Paradise Across the IT Landscape
sponsored by IBM
CASE STUDY: The following case study examines the technological feats that must be overcome by the building team and IT staff for the new, cutting-edge, South Korean Paradise City casino resort. View now and see why business continuity and resiliency play such a large part and learn about the other critical technology in play.
Posted: 29 Feb 2016 | Published: 29 Feb 2016

IBM

Red Hat Integrates Enterprise Systems for a Holistic View of Customers
sponsored by Red Hat
WHITE PAPER: This case study shows how Red Hat was able to automatically update customer data across systems without resorting to manual intervention. Learn how this was possible through a data integration platform using open source, cloud-enabled technologies.
Posted: 04 Apr 2016 | Published: 04 Apr 2016

Red Hat

Hospitality and Cybercrime: How to Safeguard Sensitive Information
sponsored by SurfWatch Labs
WHITE PAPER: This white paper explores the many cyber-risks faced by the hospitality sector. Access it and discover just how much your business is at risk – and what you can do about it.
Posted: 06 Jan 2016 | Published: 06 Jan 2016

SurfWatch Labs

Credit Union Thwarts Cryptolocker Attack With Smart Backup Policy
sponsored by SimpliVity
RESOURCE CENTER: One credit union found their banking applications stopped working due to the cryptolocker ransomware. This custom article takes a look at how their hyper-converged infrastructure contained a backup policy that enabled them to restore their virtual machines – without impacting performance or availability.
Posted: 22 Apr 2016 | Published: 22 Apr 2016

SimpliVity

Three simple steps to building a digital framework
sponsored by ComputerWeekly.com
PRESENTATION: Mark Thompson, Digital and IT Director for TUI Travel Specialist & Activity, discusses IT transformation in this PowerPoint presentation.
Posted: 10 Dec 2013 | Published: 10 Dec 2013

ComputerWeekly.com

Mitel Customer Snapshot: Wauconda Community Unit School District
sponsored by Mitel Networks Limited
CASE STUDY: This short case study shows how one Illinois K-12 school district implemented a centralized and scalable collaboration platform that made the most out of limited IT resources.
Posted: 11 Apr 2016 | Published: 11 Apr 2016

Mitel Networks Limited

How Can You Ensure Stability and Reliability?
sponsored by Red Hat
WHITE PAPER: This whitepaper explains how Red Hat Enterprise Linux can provide the stable and proven enterprise platform you need to bring new levels of simplicity to your IT operations while ensuring your underlying infrastructure is completely secure.
Posted: 08 Oct 2014 | Published: 08 Oct 2014

Red Hat

Powering the Real-Time Enterprise
sponsored by Oracle Corporation
RESOURCE: In this infographic, learn how an in-memory database can speed time to insights by providing real-time analytics, relevant data at the speed of thought, customer-centric services, and more. Additionally, explore the technology behind this in-memory database offering, and what customers are saying about it.
Posted: 24 Mar 2016 | Published: 31 Dec 2014

Oracle Corporation

Further IT Spending Cuts Likely in Europe's Public Sector
sponsored by ComputerWeekly.com
WHITE PAPER: The UK's June Budget provides a mandate for all government departments to submit their spending review plans before the summer break and reports that it has scheduled the government spending review for October.
Posted: 24 Oct 2011 | Published: 05 Jul 2010

ComputerWeekly.com

Platform provides insight into your infrastructure
sponsored by Tintri
WHITE PAPER: This white paper discusses the challenges IT faces in pinpointing performance issues and how Tintri VMstore and Tintri Global Center deliver deep insight in to utilization and performance helping IT detect trends and enhance troubleshooting.
Posted: 18 Mar 2015 | Published: 18 Mar 2015

Tintri

How Island Group Reduces Admin and Bandwidth Requirements using ApplicationServer XG
sponsored by Parallels, Inc.
CASE STUDY: The following case study reveals how by deploying ApplicationServer XG, Islands Hotels Group was able to reduce administration and bandwidth requirements.
Posted: 15 Mar 2016 | Published: 15 Mar 2016

Parallels, Inc.

5 DBA Mistakes That Can Cost You Your Job
sponsored by Idera
WHITE PAPER: This white paper reveals the 5 unforgivable mistakes that could endanger the integrity, recoverability and security of the databases, including SQL Server, DBAs are supposed to protect.
Posted: 21 Jul 2014 | Published: 21 Jul 2014

Idera

Five Steps for Delivering Self-Service Business Intelligence to Everyone
sponsored by Information Builders
WHITE PAPER: This expert white paper explores Wayne Eckerson's 5 steps for delivering self-service business intelligence to everyone in your business. Learn important aspects of the process like creating taxonomies, selecting the right tools, and more.
Posted: 11 Jun 2014 | Published: 11 Jun 2014

Information Builders

E-Guide: Configure Outbound Firewall Rules for Data Protection
sponsored by SearchSecurity.com
EGUIDE: A new form of firewall was recently developed in order to withstand more sophisticated threats. Consult this expert E-guide to learn more about the value of application firewalls and how they can benefit the security of your business.
Posted: 24 Aug 2012 | Published: 24 Aug 2012

SearchSecurity.com

Building a Business Case for Cyber Threat Intelligence
sponsored by SurfWatch Labs
WHITE PAPER: This white paper gives you 5 main reasons for a risk-based approach to cybersecurity. Access now to learn how you can know the specific cyber threats targeting your business redirect your cyber tactics for the most effective defense and bring cybersecurity into the broader risk discussion.
Posted: 25 Mar 2016 | Published: 01 Feb 2016

SurfWatch Labs

How to Thwart Privilege Creep with Access Reviews
sponsored by SearchSecurity.com
EGUIDE: In this E-Guide from SearchSecurity.com, industry expert Peter H. Gregory delves deep into the topic of privilege creep: the risks, the remedies, and key tips for access review and automation success.
Posted: 10 Apr 2013 | Published: 10 Apr 2013

SearchSecurity.com

Cyber Risk Report - Year in Review
sponsored by SurfWatch Labs
WHITE PAPER: This white paper provides high-level insight on both what cybercriminals are targeting and how they operated over the course of 2015. Learn about the evolving tactics used and how they are impacting business.
Posted: 29 Mar 2016 | Published: 01 Feb 2016

SurfWatch Labs

Stopping Privilege Creep: Limiting User Privileges with Access Reviews
sponsored by SearchSecurity.com
EGUIDE: This SearchSecurity.com e-guide outlines the risks of privilege creep and outlines the remedies available to help you successfully mitigate them. View now to learn more!
Posted: 29 Jul 2013 | Published: 29 Jul 2013

SearchSecurity.com

Smarter Service Management: A CIO's Perspective
sponsored by Matrix42
WHITE PAPER: This white paper discusses the modern CIO's top IT challenges, as well as how you can transform outdated IT service management (ITSM) practices to overcome them.
Posted: 03 Mar 2016 | Published: 31 Dec 2015

Matrix42

Building Secure Multifactor Authentication
sponsored by Okta
WHITE PAPER: As threats to password security have increased in recent years, multi-factor authentication (MFA) has rapidly gained adoption as a method for increasing the assurance of authentication for web and mobile applications. In this white paper, you'll explore the pros and cons of the several MFA strategies available.
Posted: 14 Mar 2016 | Published: 09 Mar 2016

Okta

Case Study: How CHWC Improves HCAHPS Scores and Patient Care
sponsored by Imprivata
CASE STUDY: Healthcare organizations are at risk of HIPAA breaches as employees use legacy pagers and personal devices to communicate. This case study examines how one health system replaced their outdated pager system and leveraged BYOD tech to improve patient care and mitigate device risks.
Posted: 22 Mar 2016 | Published: 24 Feb 2016

Imprivata

How to Simplify Multi-Tenancy for Hadoop
sponsored by BlueData Software, Inc.
WHITE PAPER: Hadoop can be difficult to implement on-premise, but not all organizations can move their data to the cloud. The cloud can slow performance due to network latency. This resource discusses how you can implement Hadoop on-premise and gain the simplicity and elasticity of cloud deployment.
Posted: 11 Mar 2016 | Published: 11 Mar 2016

BlueData Software, Inc.

Recovery Tools and Tips for Your Virtual Server Backup Strategy
sponsored by Veritas
EGUIDE: With all of the options admins have today, sometimes, it can be easy to forget about virtual server backups. In this expert e-guide, you will discover several, top-of-the-line recovery tools and tips to aid your virtual server backup strategy, and ensure every backup is handled correctly in your enterprise.
Posted: 17 Mar 2016 | Published: 17 Mar 2016

Veritas

Four Steps to Being More Mobile Than Ever
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Access this expert white paper to examine four key steps involved in enhancing mobility. Discover technologies and platforms that will give your organization the foundation it needs to be more flexible and mobile than ever.
Posted: 18 Mar 2015 | Published: 18 Mar 2015

Dell, Inc. and Intel®

BYOD Security: How to Remotely Wipe iPhone and Android Devices
sponsored by SearchSecurity.com
EGUIDE: In this expert e-guide, explore the need for remote data wipe on top of mandatory PINs and passwords to ensure optimum data protection in this BYOD age. Click now to get started!
Posted: 09 Dec 2013 | Published: 09 Dec 2013

SearchSecurity.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement